{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T07:17:38Z","timestamp":1718349458491},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1109\/pci.2010.17","type":"proceedings-article","created":{"date-parts":[[2010,10,27]],"date-time":"2010-10-27T16:19:22Z","timestamp":1288196362000},"source":"Crossref","is-referenced-by-count":12,"title":["When Security Meets Usability: A User-Centric Approach on a Crossroads Priority Problem"],"prefix":"10.1109","author":[{"given":"Christos A.","family":"Fidas","sequence":"first","affiliation":[]},{"given":"Artemios G.","family":"Voyiatzis","sequence":"additional","affiliation":[]},{"given":"Nikolaos M.","family":"Avouris","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00006-3"},{"key":"ref11","article-title":"Ten Usability Heuristics","author":"nielsen","year":"0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.06.006"},{"key":"ref13","author":"garfinkel","year":"1996","journal-title":"Practical UNIX and Internet Security"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408671"},{"key":"ref15","first-page":"63","article-title":"Mental Models in Human-Computer Interaction","author":"payne","year":"2008","journal-title":"The Human-computer interaction handbook"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1234772.1234787"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MTAS.2007.335563"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36159-6_24"},{"key":"ref19","author":"norman","year":"2002","journal-title":"The Design of Everyday Things"},{"key":"ref4","article-title":"Four Grand Challenged in Trustworthy Computing","year":"2003","journal-title":"final report of CRA Conference on Grand Challenged in Information Security and Assurance"},{"key":"ref3","first-page":"169","article-title":"Why Johnny can't encrypt: A usability evaluation of PGP 5.0","author":"whitten","year":"1999","journal-title":"Proceedings of the Eighth USENIX Security Symposium (Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073003"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.81"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408680"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.35"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"ref1","first-page":"52","author":"williams","year":"2002","journal-title":"Free as in Freedom Richard Stallman's Crusade for Free Software"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.79"}],"event":{"name":"2010 14th Panhellenic Conference on Informatics (PCI)","location":"Tripoli, Greece","start":{"date-parts":[[2010,9,10]]},"end":{"date-parts":[[2010,9,12]]}},"container-title":["2010 14th Panhellenic Conference on Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5599996\/5600280\/05600454.pdf?arnumber=5600454","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T17:04:19Z","timestamp":1489856659000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5600454\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/pci.2010.17","relation":{},"subject":[],"published":{"date-parts":[[2010,9]]}}}